Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package cargo-audit-advisory-db for openSUSE:Factory checked in at 2021-06-01 10:39:54 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old) and /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1898 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cargo-audit-advisory-db" Tue Jun 1 10:39:54 2021 rev:6 rq:896476 version:20210601 Changes: -------- --- /work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes 2021-05-08 22:08:46.937388011 +0200 +++ /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1898/cargo-audit-advisory-db.changes 2021-06-01 10:41:31.573228237 +0200 @@ -1,0 +2,15 @@ +Tue Jun 01 01:28:10 UTC 2021 - wbr...@suse.de + +- Update to version 20210601: + * Assigned RUSTSEC-2021-0069 to lettre (#925) + * Add lettre smtp vulnerability (#924) + * Assigned RUSTSEC-2021-0068 to iced-x86 (#923) + * iced-x86: fix lint (#922) + * Add advisory for iced-x86 soundness bug (#914) + * Assigned RUSTSEC-2021-0067 to cranelift-codegen (#921) + * fixes #915 - remove duplicate word (#916) + * Add RUSTSEC notice for CVE-2021-32629, a Cranelift miscompilation bug. (#918) + * Bump rustsec-admin to v0.4.3 (#919) + * evm-core: fix crate name (#911) + +------------------------------------------------------------------- Old: ---- advisory-db-20210507.tar.xz New: ---- advisory-db-20210601.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cargo-audit-advisory-db.spec ++++++ --- /var/tmp/diff_new_pack.0KynPm/_old 2021-06-01 10:41:32.041229034 +0200 +++ /var/tmp/diff_new_pack.0KynPm/_new 2021-06-01 10:41:32.041229034 +0200 @@ -17,7 +17,7 @@ Name: cargo-audit-advisory-db -Version: 20210507 +Version: 20210601 Release: 0 Summary: A database of known security issues for Rust depedencies License: CC0-1.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.0KynPm/_old 2021-06-01 10:41:32.069229081 +0200 +++ /var/tmp/diff_new_pack.0KynPm/_new 2021-06-01 10:41:32.069229081 +0200 @@ -2,7 +2,7 @@ <service mode="disabled" name="obs_scm"> <param name="url">https://github.com/RustSec/advisory-db.git</param> <param name="scm">git</param> - <param name="version">20210507</param> + <param name="version">20210601</param> <param name="revision">master</param> <param name="changesgenerate">enable</param> <param name="changesauthor">wbr...@suse.de</param> ++++++ advisory-db-20210507.tar.xz -> advisory-db-20210601.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/.duplicate-id-guard new/advisory-db-20210601/.duplicate-id-guard --- old/advisory-db-20210507/.duplicate-id-guard 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/.duplicate-id-guard 2021-05-22 20:13:18.000000000 +0200 @@ -1,3 +1,3 @@ This file causes merge conflicts if two ID assignment jobs run concurrently. This prevents duplicate ID assignment due to a race between those jobs. -0ebb4b8968ecfc3c4e67cc1851642dfa8b0b61fe7bde39d0807e3cebe51000c2 - +ff091e2402596ebe5667596b7b07f686f263921249d154a8b98e063059c521aa - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/.github/workflows/assign-ids.yml new/advisory-db-20210601/.github/workflows/assign-ids.yml --- old/advisory-db-20210507/.github/workflows/assign-ids.yml 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/.github/workflows/assign-ids.yml 2021-05-22 20:13:18.000000000 +0200 @@ -15,12 +15,12 @@ uses: actions/cache@v1 with: path: ~/.cargo/bin - key: rustsec-admin-v0.4.2 + key: rustsec-admin-v0.4.3 - name: Install rustsec-admin run: | if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then - cargo install rustsec-admin --vers 0.4.2 + cargo install rustsec-admin --vers 0.4.3 fi - name: Assign IDs diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/.github/workflows/publish-web.yml new/advisory-db-20210601/.github/workflows/publish-web.yml --- old/advisory-db-20210507/.github/workflows/publish-web.yml 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/.github/workflows/publish-web.yml 2021-05-22 20:13:18.000000000 +0200 @@ -14,10 +14,10 @@ - uses: actions/cache@v1 with: path: ~/.cargo/bin - key: rustsec-admin-v0.4.2 + key: rustsec-admin-v0.4.3 - run: | if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then - cargo install rustsec-admin --vers 0.4.2 + cargo install rustsec-admin --vers 0.4.3 fi rustsec-admin web . git config user.name github-actions diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/.github/workflows/validate.yml new/advisory-db-20210601/.github/workflows/validate.yml --- old/advisory-db-20210507/.github/workflows/validate.yml 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/.github/workflows/validate.yml 2021-05-22 20:13:18.000000000 +0200 @@ -16,12 +16,12 @@ uses: actions/cache@v1 with: path: ~/.cargo/bin - key: rustsec-admin-v0.4.2 + key: rustsec-admin-v0.4.3 - name: Install rustsec-admin run: | if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then - cargo install rustsec-admin --vers 0.4.2 + cargo install rustsec-admin --vers 0.4.3 fi - name: Lint advisories diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/README.md new/advisory-db-20210601/README.md --- old/advisory-db-20210507/README.md 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/README.md 2021-05-22 20:13:18.000000000 +0200 @@ -1,7 +1,7 @@ # RustSec Advisory Database [![Build Status][build-image]][build-link] -![Maintained: Q1 2021][maintained-image] +![Maintained: Q2 2021][maintained-image] [![Project Chat][chat-image]][chat-link] The RustSec Advisory Database is a repository of security advisories filed @@ -45,7 +45,7 @@ package = "mycrate" # Disclosure date of the advisory as an RFC 3339 date (mandatory) -date = "2019-10-01" +date = "2021-01-31" # URL to a long-form description of this issue, e.g. a GitHub issue/PR, # a change log entry, or a blogpost announcing the release (optional) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/anymap/RUSTSEC-2021-0065.md new/advisory-db-20210601/crates/anymap/RUSTSEC-2021-0065.md --- old/advisory-db-20210507/crates/anymap/RUSTSEC-2021-0065.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210601/crates/anymap/RUSTSEC-2021-0065.md 2021-05-22 20:13:18.000000000 +0200 @@ -0,0 +1,18 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0065" +package = "anymap" +date = "2021-05-07" +informational = "unmaintained" +url = "https://github.com/chris-morgan/anymap/issues/37" +[versions] +patched = [] +unaffected = [] +``` + +# anymap is unmaintained. + +The `anymap` crate does not appear to be maintained, and the most recent +published version 0.12.1 includes a soundness bug. This has been +[fixed](https://github.com/chris-morgan/anymap/pull/32) a few years ago, but +was never released. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/cranelift-codegen/RUSTSEC-2021-0067.md new/advisory-db-20210601/crates/cranelift-codegen/RUSTSEC-2021-0067.md --- old/advisory-db-20210507/crates/cranelift-codegen/RUSTSEC-2021-0067.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210601/crates/cranelift-codegen/RUSTSEC-2021-0067.md 2021-05-22 20:13:18.000000000 +0200 @@ -0,0 +1,28 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0067" +package = "cranelift-codegen" +date = "2021-05-21" +url = "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5" +categories = ["code-execution", "memory-corruption", "memory-exposure"] +keywords = ["miscompile", "sandbox", "wasm"] +aliases = ["CVE-2021-32629"] + +[versions] +patched = [">= 0.73.1", ">= 0.74"] + +[affected] +arch = ["x86"] +``` + +# Memory access due to code generation flaw in Cranelift module + +There is a bug in 0.73.0 of the Cranelift x64 backend that can create a +scenario that could result in a potential sandbox escape in a WebAssembly +module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 +or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 +should update to 0.73.1 or 0.74 if they were not using the old default backend. + +More details can be found in the GitHub Security Advisory at: + +<https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/evm-core/RUSTSEC-2021-0066.md new/advisory-db-20210601/crates/evm-core/RUSTSEC-2021-0066.md --- old/advisory-db-20210507/crates/evm-core/RUSTSEC-2021-0066.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210601/crates/evm-core/RUSTSEC-2021-0066.md 2021-05-22 20:13:18.000000000 +0200 @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0066" +package = "evm-core" +date = "2021-05-11" +url = "https://github.com/rust-blockchain/evm" +categories = ["denial-of-service"] + +[versions] +patched = [">= 0.26.1", "0.25.1", "0.24.1", "0.23.1", "0.21.1"] +``` + +# Denial of service on EVM execution due to memory over-allocation + +Prior to the patch, when executing specific EVM opcodes related +to memory operations that use `evm_core::Memory::copy_large`, the +crate can over-allocate memory when it is not needed, making it +possible for an attacker to perform denial-of-service attack. + +The flaw was corrected in commit `19ade85`. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/iced-x86/RUSTSEC-2021-0068.md new/advisory-db-20210601/crates/iced-x86/RUSTSEC-2021-0068.md --- old/advisory-db-20210507/crates/iced-x86/RUSTSEC-2021-0068.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210601/crates/iced-x86/RUSTSEC-2021-0068.md 2021-05-22 20:13:18.000000000 +0200 @@ -0,0 +1,24 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0068" +package = "iced-x86" +date = "2021-05-19" +url = "https://github.com/icedland/iced/issues/168" +keywords = ["soundness"] + +[affected] +functions = { "iced_x86::Decoder::new" = ["<= 1.10.3"] } + +[versions] +patched = ["> 1.10.3"] +``` + +# Soundness issue in `iced-x86` versions <= 1.10.3 + +Versions of iced-x86 <= 1.10.3 invoke undefined behavior which may cause soundness +issues in crates using the `iced_x86::Decoder` struct. The `Decoder::new()` function +made a call to `slice.get_unchecked(slice.length())` to get the end position of +the input buffer. The flaw was fixed with safe logic that does not invoke undefined +behavior. + +More details can be found at <https://github.com/icedland/iced/issues/168>. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/kekbit/RUSTSEC-2020-0129.md new/advisory-db-20210601/crates/kekbit/RUSTSEC-2020-0129.md --- old/advisory-db-20210507/crates/kekbit/RUSTSEC-2020-0129.md 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/crates/kekbit/RUSTSEC-2020-0129.md 2021-05-22 20:13:18.000000000 +0200 @@ -7,7 +7,7 @@ categories = ["memory-corruption", "thread-safety"] [versions] -patched = [] +patched = [">= 0.3.4"] ``` # ShmWriter allows sending non-Send type across threads diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/lettre/RUSTSEC-2021-0069.md new/advisory-db-20210601/crates/lettre/RUSTSEC-2021-0069.md --- old/advisory-db-20210507/crates/lettre/RUSTSEC-2021-0069.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210601/crates/lettre/RUSTSEC-2021-0069.md 2021-05-22 20:13:18.000000000 +0200 @@ -0,0 +1,27 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0069" +package = "lettre" +date = "2021-05-22" +url = "https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2" +categories = ["format-injection"] +keywords = ["email", "smtp"] +aliases = ["GHSA-qc36-q22q-cjw3"] + +[versions] +patched = [">= 0.10.0-rc.3", "< 0.10.0-alpha.1, >= 0.9.6"] +unaffected = ["< 0.7.0"] + +[affected.functions] +# smtp transport +"lettre::smtp::SmtpTransport::send" = ["< 0.10.0-alpha.1"] +"lettre::transport::smtp::SmtpTransport::send" = [">= 0.10.0-alpha.1, < 0.10.0-rc.3"] +"lettre::transport::smtp::SmtpTransport::send_raw" = [">= 0.10.0-alpha.1, < 0.10.0-rc.3"] +``` + +# SMTP command injection in body + +Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it. + +The flaw is fixed by correctly handling consecutive CRLF sequences. + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210507/crates/traitobject/RUSTSEC-2020-0027.md new/advisory-db-20210601/crates/traitobject/RUSTSEC-2020-0027.md --- old/advisory-db-20210507/crates/traitobject/RUSTSEC-2020-0027.md 2021-05-07 01:45:32.000000000 +0200 +++ new/advisory-db-20210601/crates/traitobject/RUSTSEC-2020-0027.md 2021-05-22 20:13:18.000000000 +0200 @@ -16,7 +16,7 @@ patched = [] ``` -# traitobject assumes assumes the layout of fat pointers +# traitobject assumes the layout of fat pointers This crate gets the data pointer from fat pointers assuming that the first element in a fat pointer is the data pointer. This is currently true, but